AI/ML Security
AI Governance
Overview: Establishing and overseeing guidelines and practices to ensure the ethical, transparent, and accountable development and implementation of AI.
Example(s): Cranium, Credo AI, Holistic AI
LLM Security
Overview: Practices and measures to protect LLM models from being exploited for malicious purposes, and to ensure their safe, ethical, and responsible use.
Example(s): Robust Intelligence, CalypsoAI, Lakera, Cape Privacy
ML Security
Overview: Protecting machine learning systems from attacks, manipulations, and vulnerabilities, ensuring the integrity, reliability, and confidentiality of ML models and their data
Example(s): HiddenLayer, Protect AI, Adversa AI
Application Security
Application Protection
API Security
Overview: Processes and tools for preventing and monitoring malicious attacks and misuse of APIs.
Example(s): Salt Security, Noname, Wallarm, 42Crunch, Astrix
Bot Mitigation
Overview: Techniques and tools for assessing website bots and blocking malicious activity.
Example(s): Fingerprint, HUMAN, Kasada, Netacea
CI/CD Security
Overview: Integrating security practices and tools into the Continuous Integration (CI) and Continuous Deployment (CD) pipeline to protect software during the testing, build, and deployment processes.
Example(s): Cloudsmith, BluBracket
Runtime Application Self-Protection (RASP)
Overview: Technology that integrates with an application to detect and prevent real-time attacks by analyzing behavior and context during execution.
Example(s): Contrast, Ghost, Data Theorem, Talsec
Web Application Firewall (WAF)
Overview: Systems to protect web applications or APIs against exploits, bots, and attacks that compromise the security and availability of web applications.
Example(s): F5 Advanced WAF, Signal Sciences, Cloudflare Web Application Firewall, Reblaze
Application Security Testing
Application Security Posture Management (ASPM)
Overview: The continuous process of assessing, improving, and monitoring the security state of software applications.
Example(s): Bionic, Cycode, Enso Security, Legit Security
Dynamic Application Security Testing (DAST)
Overview: A method of testing applications for security vulnerabilities by simulating external attacks on a running application.
Example(s): Project Discovery, OWASP ZAP, StackHawk, Burp Suite
Fuzz Testing
Overview: A testing technique that involves inputting random, malformed, or unexpected data into an application to detect coding errors and security vulnerabilities.
Example(s): Code Intelligence, Mayhem, Google OSS-Fuzz
Infrastructure as Code (IaC) Security
Overview: Practices and tools used to ensure that the code and processes used to automate and manage IT infrastructure are secure and free from vulnerabilities.
Example(s): Apiiro, Bridgecrew, GuardRails, Trivy
Mobile Application Security Testing (MAST)
Overview: The process of assessing and identifying security vulnerabilities in mobile applications.
Example(s): Appknox, Guardsquare, Zimperium Mobile App Protection Suite (MAPS)
Software Supply Chain Security
License Compliance
Overview: Ensuring the use of software within an organization adheres to the terms and conditions outlined in its licensing agreements.
Dependency Scanning
Overview: The process of analyzing dependencies for known vulnerabilities and security issues to ensure the security and integrity of an application's third-party components.
Example(s): GitLab Dependency Scanning, Retire.js, OWASP Dependency-Check
Code Signing
Overview: The process of digitally signing software to verify the author's identity and ensure that the code has not been altered or corrupted since it was signed.
Example(s): Sigstore, SignPath, PrimeKey Code Signing
Software Composition Analysis (SCA)
Overview: Processes to identify use of open source software in a codebase to evaluate security, quality, licensing, and other software supply chain risks.
Example(s): Mend.io, Synopsys Black Duck
Software Bill of Materials (SBOM)
Overview: A comprehensive inventory of all components, libraries, and modules used in an application, detailing their versions, licenses, and dependencies.
Example(s): Anchore, Finite State, FOSSA
Blockchain and Web3
Overview: Tools for securing and managing risks on blockchain and Web3 platforms.
Example(s): Aleo, CertiK, Chainalysis, Fireblocks, Ledger, StarkWare
Capital Markets
Overview: Financial markets where equity and debt are traded, facilitating capital raises by companies, investments by individuals and institutions, and mergers and acquisitions by strategic buyers and institutional investors.
Angel and Seed Investors
Independent individual investors or a group of individual investors who invest capital in early stage cybersecurity companies.
Example(s): Boldstart, Silicon Valley CISO Investments, Team8, Cyberstarts
Certifications and Training
Overview: Comprehensive cybersecurity awareness, education, and credentialing organizations covering one or more major cybersecurity domains.
Example(s): SANS Institute, OffSec, ISC2
Consumer Security and Privacy
Overview: Practices and countermeasures to protect personal data and ensure the digital safety of consumers against unauthorized access, misuse, and threats.
Cyber Crime
Overview: Illegal activities conducted online, including offenses like hacking, identity theft, and online fraud.
Advanced Persistent Threats (APT)
Organized groups of threat actors who gain unauthorized access to networks for political or economic reasons.
Example(s): Cozy Bear, Double Dragon
Data Security
Data Protection
Database Security
Overview: Tools, controls, and processes to protect databases from compromise.
Example(s): JumpWire, Fortinet FortiGuard Database Security, Baffle
Data Security Posture Management (DSPM)
Overview: A comprehensive approach to continuously identify, assess, and manage the security of data across an organization's entire digital landscape.
Example(s): Cyberhaven, Cyera, Metomic, Normalyze, Reco
e-Discovery
Overview: Identification, collection, and storage of electronic information for investigations and legal requests.
Example(s): Relativity, Logicube, Nuix
Public Key Infrastructure
Overview: Infrastructure to establish and manage public key encryption for user identities, device identities, and secure end-to-end communications.
Example(s): Entrust, Keyfactor, Let's Encrypt
Rights Management
Overview: Software to help companies protect digital content (videos, images, files, etc.) from unauthorized distribution and duplication.
Example(s): Vera, Seclore EDRM
Data Resilience
Backup and Recovery
Overview: Processes and tools for creating, storing, and restoring copies of data to protect against data loss.
Example(s): Veritas, Rewind, Hewlett Packard Enterprise Data Protection
Secure Storage
Overview: Processes, hardware, and facilities for maintaining data security and integrity.
Example(s): Commvault, Iron Mountain
Privacy
Data Discovery and Classification
Overview: The process of scanning data sources to find and classify structured and unstructured data, with a focus on sensitive and/or regulated data.
Example(s): ActiveNav, Tanium Reveal, Varonis Data Classification Engine
Enterprise Communication
Overview: Messaging solutions to help employees and partners within an organization communicate securely.
Example(s): Mattermost, Silent Circle
Encryption and Tokenization
Overview: Processes and tools for transforming sensitive data into an encrypted or masked value.
Example(s): Evervault, Skyflow, Very Good Security
Fraud and Transaction Security
Overview: Measures and technologies to protect financial transactions and sensitive data from fraudulent activities and unauthorized access.
Governance, Risk, and Compliance
Compliance
Auditors and Assessors
Overview: Firms authorized to conduct independent reviews and certify compliance with regulations and standards.
Compliance Automation
Overview: Tools for automating compliance processes and continuous controls monitoring.
Example(s): AuditCue, RegScale, Tugboat Logic, Very Good Security
Regulations
Overview: Official rules to enforce laws created by governments. Implemented and maintained by authorized government agencies.
Governance
GRC
Overview: Systems to automate and integrate enterprise, operational, and IT risk management processes and data.
Example(s): AuditBoard, Camms, LogicGate, Onspring
Metrics and Dashboards
Overview: Tools used to track and display key performance indicators to measure cybersecurity risk and effectiveness.
Policies and Procedures
Overview: Written documents and tools for managing rules for individuals accessing an organization's systems and data.
Example(s): SANS Security Policy Templates, Comprose, FreePrivacyPolicy
Security Architecture
Overview: A core information security function that defines and guides architectural requirements and design of security-relevant elements within an organization.
Security Awareness
Overview: Materials and products to measure and improve the knowledge and understanding individuals have about cyber threats and the best practices to safeguard against them.
Example(s): KnowBe4, Living Security, CybSafe, Riot
Segregation of Duties (SOD)
Overview: Automated enforcement of shared responsibilities among multiple people for execution of critical processes. Reduces fraud and errors.
Example(s): SAP Access Control, Pathlock
Standards and Frameworks
Overview: Documented guidance for policies and controls to systematically manage security and risk.
Example(s): NIST Special Publication 800-53, ISO 27002, ISACA COBIT, MITRE ATT&CK
Privacy Program Management
Assessment Managers
Overview: Workflows and automation for various functions of a privacy program.
Consent Management
Overview: Systems and processes for notifying users about personal data collection and collecting explicit consent.
Example(s): CookieYes, Enzuzo, Osano, UserCentrics
Data Mapping
Overview: Tools to help organizations map data flows across the enterprise.
Example(s): DataGrail, BigID Data Mapping
Data Subject Request Automation
Overview: Processes and tools to support individual requests for personal data and use under data privacy laws.
Example(s): Transcend, Ethyca, Ketch Data Subject Rights Fulfillment, MineOS
Privacy Information Managers
Overview: Information and updates for understanding global privacy laws and regulations.
Example(s): OneTrust DataGuidance
Website Scanning
Overview: Tools to check websites to identify which cookies, beacons, and trackers are in use.
Example(s): PrivacyScore, Sovy GDPR Scan, Blacklight
Risk
Cyber Insurance
Overview: Specialty business insurance for protection against cybersecurity-related losses, including data breaches, ransomware, and other incidents.
Enterprise Risk Management
Overview: Identification, management, and remediation of company-wide risk at an executive level.
Example(s): COSO Enterprise Risk Management Framework, ISO 31000
Third-Party Risk Management (TPRM)
Overview: Identifying, assessing, and mitigating risks associated with external entities like vendors, suppliers, and partners that an organization engages with.
Example(s): Black Kite, Interos, UpGuard
Government and NGOs
Overview: Public and not-for-profit entities responsible for researching, creating, enforcing, and promoting policies, regulations, standards and initiatives to protect digital information and infrastructure from cyber threats and ensure data privacy.
Agencies
Government agencies specializing in cybersecurity policy, research, and protection.
Example(s): Cybersecurity & Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), National Institute of Standards and Technology (NIST), National Security Agency (NSA), Unit 8200
Identity Security
Authentication
Access Management
Overview: Platforms for identifying, tracking, controlling, and managing user access to applications and infrastructure.
Customer Identity (CIAM)
Overview: Systems for controlling customer access to applications and managing customer profile information.
Example(s): Auth0, Descope, FusionAuth
Electronic Identification
Overview: Government systems for digital proof of identity for citizens and organizations.
Example(s): Aadhaar, Israeli ID
Identity Graphing and Resolution
Overview: Services that correlate online and offline identifiers with consumer identities to create an accurate view of customers.
Example(s): LiveRamp Identity Resolution, Amperity Identity Resolution
Know Your Business (KYB)
Overview: The process of verifying the identity and assessing the legitimacy of businesses, typically for compliance and risk management purposes.
Multi-Factor Authentication (MFA)
Overview: Authentication that replaces traditional passwords or combines two or more authentication requirements (e.g. password and one-time token) for increased security.
Example(s): Authy, Duo Security, Yubico
Passwordless
Overview: Verification of identities without the use of traditional passwords, instead relying on methods like biometrics, tokens, or cryptographic keys.
Example(s): Beyond Identity, HYPR, Passage, Trusona
SaaS Identity Risk Management
Overview: Assessing, monitoring, and mitigating risks associated with user access and authentication in unmanaged SaaS applications.
Secrets Management
Overview: Securely handling, storing, and accessing sensitive information like tokens and encryption keys for protecting access to applications and services.
Example(s): CyberArk Conjur, GitGuardian, HashiCorp Vault, Truffle Security
Self-Service Password Reset (SSPR)
Overview: Toos that allow users to reset their passwords independently, typically through a series of authentication steps.
Example(s): FastPass, Quest Password Manager
Social Login
Overview: Sign in to third party sites using authentication from social networks.
Example(s): Facebook Login, Google Sign-In, Sign in with Slack
Web3 Authentication
Overview: Decentralized and user-centric identification systems in the blockchain and cryptocurrency space, enabling users to own and control their digital identities without relying on central authorities.
Example(s): Dock, Dynamic, Fractal ID, NuID, Polygon ID, Privy
Authorization
Background Screening
Overview: Services that compile and help verify employment, criminal, financial, and other records for people and organizations.
Centralized Authorization
Overview: A security approach where access control decisions for multiple systems or applications are managed from a single, unified point of policy enforcement and management.
Example(s): Axiomatics, Oso, SGNL
Data Access Governance
Overview: Systems for gaining visibility and enforcing access control policies on unstructured data (spreadsheets, documents, PDFs, etc.).
Directory Services
Overview: A repository for collecting information about users, devices, and resources for authentication and authorization. LDAP is a common standard for directory services.
Example(s): Microsoft Entra ID, ForgeRock Directory Services, JumpCloud
Identity Governance and Administration (IGA)
Overview: Systems for administering accounts and credentials, access provisioning, and access reviews.
Identity Wallets
Overview: Identity stores that allow users to manage and share their digital identity credentials and data.
Example(s): Spruce, Auth0 Sign In With Ethereum (SIWE)
Physical Access Control
Overview: Solutions that manage physical identities and access to physical locations and spaces.
Example(s): Envoy, Avigilon, Kisi, Honeywell Forge
Privileged Access Management (PAM)
Overview: Systems for managing privileged (elevated) access for users, shared accounts, secrets, keys, and other high risk credentials.
Example(s): BeyondTrust, Delinea, Teleport
Web3 Authorization
Overview: The decentralized process of granting or restricting access to resources and actions in blockchain and decentralized applications, based on verified digital identities and smart contracts.
Example(s): Gatekeeper
Infrastructure Security
Cloud Security
Cloud Infrastructure Entitlements Management (CIEM)
Overview: Tools to help companies manage permissions and detect excessive or risky access in cloud environments.
Example(s): K9 Security, Sonrai
Cloud Security Posture Management (CSPM)
Overview: Continuous management, monitoring, policy enforcement, and compliance for cloud environment configurations.
Example(s): Microsoft Defender for Cloud, Cloudanix, CrowdStrike Falcon Horizon
Cloud Workload Protection Platforms (CWPP)
Overview: Processes and tools for securing containers and workloads within different cloud environments.
Example(s): Amazon GuardDuty, Intezer Protect, Zscaler Cloud Protection
Container Security
Overview: Measures and practices to protect containerized applications and their underlying infrastructure from threats and vulnerabilities throughout the container lifecycle.
Example(s): Fairwinds, Portainer, Red Hat Advanced Cluster Security
SaaS Security
Overview: Strategies and measures implemented to protect data, applications, and services hosted on Software as a Service (SaaS) platforms.
Example(s): AppOmni, Nudge Security, Obsidian, Push Security
Email Security
Anti-Spam and Anti-Phishing
Overview: Security measures designed to detect, block, and prevent unwanted or deceptive emails, such as spam and phishing attempts, from reaching users.
Example(s): Avanan, Cloudflare Area 1 Email Security, GreatHorn, MX Layer
Email Archiving
Overview: Storing, preserving, and organizing email communications for long-term retention, easy retrieval, and compliance purposes.
Example(s): ArcTitan, Global Relay, Smarsh
Email Encryption
Overview: Encrypting email messages in transit and/or at rest to protect their content from being read by anyone other than the intended recipients.
Example(s): Paubox, Proton Mail, Mailfence
Phishing Simulation
Overview: A training tool that sends simulated phishing emails to users, testing their ability to recognize and respond to phishing attacks.
Example(s): Cofense, Hook Security, Phished
Secure Email Gateways (SEGs)
Overview: Security solutions that monitor and filter incoming and outgoing emails to protect against spam, viruses, phishing attacks, and other email-based threats.
Endpoint Security
Endpoint Detection and Response (EDR)
Overview: Tools installed on endpoints to record key activity for monitoring and threat investigations.
Endpoint Privilege Management (EPM)
Overview: Approach and tools for protecting against execution of malware and unapproved applications on endpoints.
Endpoint Protection Platforms (EPP)
Overview: Software to protect endpoints from threats, including malware, ransomware, phishing, and data theft.
Example(s): Deep Instinct, SparkCognition EPP, WithSecure
File Integrity Monitoring
Overview: Solutions to monitor changes in operating system, database, and application files.
Host Encryption
Overview: The process of encrypting the data stored on a host, such as a server or a computer, to protect it against unauthorized access and ensure its confidentiality.
Example(s): Apple FileVault, Microsoft BitLocker, Symantec Encryption
Host Intrusion Prevention System (HIPS)
Overview: Endpoint-based intrusion detection and prevention system to monitor and analyze internals and network traffic on the endpoint for prevention and detection of threats.
Mobile Device Management (MDM)
Overview: Technology used to secure, monitor, manage, and support mobile devices deployed across mobile operators, service providers, and enterprises.
Mobile Security
Overview: Tools protect sensitive information stored on mobile devices, including smartphones, tablets, and wearables.
Network Security
DDoS Mitigation
Overview: Services to throttle and prevent distributed denial of service attack disruptions.
DNS Security
Overview: Protecting the Domain Name System (DNS) from threats and ensuring the integrity and availability of DNS queries and responses.
Example(s): Cloudflare DNS, HYAS, OpenDNS
Firewalls
Overview: Network security devices to regulate network traffic based on rules.
Microsegmentation
Overview: Techniques and tools to logically divide networks into security segments with specific controls based on the risk and requirements of each segment.
Example(s): Akamai Guardicore, Elisity, Illumio
Network Access Control (NAC)
Overview: Systems that provide visibility and control of devices accessing a network.
Example(s): Aruba Secure Network Access Control, Portnox
Network Detection and Response (NDR)
Overview: Solutions that continuously monitor network traffic for malicious activities and anomalies, facilitating rapid detection and response to threats.
Example(s): Darktrace DETECT, ExtraHop, Vectra AI
SSL Visibility
Overview: Tools that provide visibility into encrypted network traffic for monitoring and threat analysis.
Example(s): F5 SSL Orchestrator, Broadcom SSL Visibility Appliance
Wireless Security
Overview: Prevention of damage and unauthorized access via wireless networks.
Example(s): Plume, 7SIGNAL, WatchGuard Secure Wi-Fi, Aruba Wireless
Secure Access Service Edge (SASE)
Cloud Access Security Brokers (CASB)
Overview: Platforms to help secure and manage use of cloud-based SaaS applications and infrastructure.
Data Loss/Leakage Prevention (DLP)
Overview: Systems to detect and prevent transmission of sensitive data.
Device Trust
Overview: A security approach that evaluates and verifies the trustworthiness of a device based on its attributes and configuration before granting it access.
Example(s): Kolide
Remote Browser Isolation (RBI)
Overview: Technology that executes web browsing sessions in a remote, isolated environment, protecting the user's device from direct exposure to potential internet threats.
Secure Web Browsers
Overview: Security-focused web browsers and isolation for enterprises.
Secure Web Gateway (SWG)
Overview: Systems to filter user-initiated internet traffic and enforce corporate and regulatory content policies.
Software-Defined Wide Area Network (SD-WAN)
Overview: A networking approach that uses software to control, optimize, and secure traffic routing across wide area networks.
Example(s): HPE Aruba EdgeConnect SD-WAN, Nuage Networks, Versa Networks
Virtual Private Networks (VPN)
Overview: Systems that enable users to securely and privately browse public internet sites and access private networks across a public network.
Example(s): NordVPN, ProtonVPN, Ivanti Connect Secure
Zero Trust Network Access (ZTNA)
Overview: Products that broker access to applications and network resources based on identity and context.
Media
Overview: Organizations providing broad industry coverage, including analysis, events, news, and more.
Example(s): Gartner, Forrester, Information Security Media Group (ISMG), Omdia
Physical Security
Overview: Measures and controls to protect people, assets, and facilities from physical actions and events that could cause serious loss or damage.
Security Operations
Digital Forensics and Incident Response (DFIR)
Cloud Investigationand Response Automation (CIRA)
Overview: Automated data collection and analysis across multi-cloud environments for cloud incident investigations.
Deception
Overview: Tools and techniques to deceive and catch attackers by imitating real assets as traps and decoys.
Example(s): Illusive Attack Detection System
Forensics
Overview: Tracking and analysis of data on networks, mobile devices, computers, and storage devices for cybercrime investigations.
Example(s): AccessData, The Sleuth Kit, EnCase
Intelligence
Open Source Intelligence (OSINT)
Overview: Collection of publicly available data and information sources to provide actionable intelligence.
Threat Intelligence
Overview: Collection of intelligence used to understand current or future threats to an organization.
Example(s): GreyNoise, Flashpoint, Cybersixgill, SpyCloud
Intrusion Detection and Prevention
Canaries
Overview: Decoy data or systems strategically placed within a network to detect and alert on unauthorized access or malicious activity, functioning as an early warning system.
Example(s): Thinkst Canary
Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
Overview: Systems to monitor and prevent network traffic using recognized security threat profiles.
Example(s): CheckPoint Intrusion Prevention System, Cisco Secure IPS
Monitoring and Operations
Analytics
Overview: Data analytics platforms to proactively monitor and analyze security data.
Employee Monitoring
Overview: Monitoring tools for logging and measuring employee activity and productivity.
Extended Detection and Response (XDR)
Overview: Systems to aggregate and analyze data to improve threat detection and incident response.
Example(s): CrowdStrike Falcon XDR, Palo Alto Networks Cortex XDR, Sophos XDR, Cynet
Network Performance Monitoring
Overview: Platforms to visualize, monitor, optimize, troubleshoot, and report on the health and availability of networks.
Example(s): NetScout, SolarWinds Network Performance Monitor
Security Data Lakes
Overview: A centralized repository that stores large volumes of raw security data from various sources within commercial cloud data platforms, enabling advanced analytics and threat detection.
Example(s): Elysium Analytics, Hunters, Panther
Security Orchestration, Automation, and Response (SOAR)
Overview: Automation to increase the speed, reliability, and accuracy of security operations workflows.
Example(s): Tines, Torq, Revelstoke, Cyware, Swimlane
Security Information and Event Management (SIEM)
Overview: Tools to consolidate and correlate log data for identification of security incidents.
Example(s): Devo, Splunk Enterprise Security, Sumo Logic Cloud SIEM, Elastic SIEM, Securonix
User and Entity Behavior Analytics (UEBA)
Overview: Processes and tools to detect threats based on patterns in user behavior.
Example(s): Securonix UEBA, Gurucul, Exabeam Behavioral Analytics
Service Management
Asset Management
Overview: Processes and tools for identifying and managing IT assets and their potential security risks.
Configuration Management Database (CMDB)
Overview: A database for storing information about hardware and software assets. CMDBs are primarily used for IT Service Management; however, much of the data is applicable to security operations.
Example(s): ServiceNow CMDB, Solarwinds CMDB
Patch and System Management
Overview: Processes and tools for keeping applications and infrastructure up to date with patches to address bugs and vulnerabilities.
Example(s): Tanium Patch, Solarwinds Patch Manager, ManageEngine Patch Manager
Vulnerability Assessment and Management
Attack Surface Management (ASM)
Overview: The continuous process of identifying, cataloging, monitoring, and minimizing exposed and potentially exploitable points in an organization's environment.
Example(s): JupiterOne, Balbix, Upguard, NMAP
Cyber Range
Overview: Platforms for hands-on cybersecurity attack training and practice.
Example(s): Hack the Box, Cyberbit Cyber Range
External Attack Surface Management (EASM)
Overview: Identifying, analyzing, and securing an organization's publicly exposed systems, services, and data to mitigate risks from external threats.
Penetration Testing
Overview: Intentional attacks on applications, networks, and infrastructure to identify exploitable vulnerabilities.
Example(s): Wireshark, Metasploit, Praetorian Chariot
Social Engineering
Overview: Techniques to manipulate people into exposing confidential information, allowing unauthorized access, and other human-exploitable vulnerabilities.
Example(s): Cofense
Services
Managed Services
Incident Response (IR)
Overview: specialized assistance from external experts to effectively manage and mitigate the impact of cybersecurity incidents to recover and minimize damage.
Managed Detection and Response (MDR)
Overview: Outsourced management and monitoring for advanced cybersecurity functions and systems, including threat intelligence, threat hunting, and incident response.
Example(s): Arctic Wolf, BlueVoyant, Deepwatch, eSentire, Red Canary, Sophos
Managed Security Service Provider (MSSP)
Overview: Outsourced management and monitoring for basic cybersecurity functions and systems.
Professional Services
Boutique
Overview: Specialized cybersecurity, privacy, or risk consulting practices within small professional services firms.
Example(s): NetSPI, Praetorian, BeyondID, Cyderes
Talent Marketplaces
Crowdsourcing
Overview: Public platforms for specific cybersecurity services, such as bug bounties.
Freelance Consulting
Overview: Platforms for short-term cybersecurity gigs or contracts for 1099 workers through an employer.
Example(s): PwC Talent Exchange, EY GigNow, Accenture Contractor Exchange, Toptal